A password-based authentication and key establishment scheme for mobile environment

被引:0
|
作者
Liu, Jun [1 ]
Liao, Jianxin [1 ]
Zhu, Xiaomin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a cost-effective, use-convenient, and well-performing password-based authentication and key establishment scheme by means of IC (integrated circuit) card, RSA cryptography, and discrete logarithm. There doesn't exist any verification (password) table at the server side. To be applicable for the mobile environment, the scheme is designed as a one-roundtrip protocol to reduce the communication consumption over wireless channel. Moreover, the facts that users in this scheme are avoided downloading CRL (certificate revocation list) Periodically and change the passwords in use without any interaction with servers over the radio are another two contributing factors to enhance the performance. Making use of queuing model M/G/1/N, we measure the Performance of the scheme and compare it with TLS in terms of response time.
引用
收藏
页码:99 / +
页数:2
相关论文
共 50 条
  • [1] Password-based user authentication protocol for mobile environment
    Moon, Sung-Won
    Kim, Young-Gab
    Moon, Chang-Joo
    Baik, Doo-Kwon
    [J]. Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 743 - 753
  • [2] Cryptanalysis and Enhancement of a Password-Based Authentication Scheme
    Eldefrawy, Mohamed H.
    Al-Muhtadi, Jalal F.
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 548 - 551
  • [3] Efficient password-based authentication and key exchange scheme preserving user privacy
    Chai, Zhenchuan
    Cao, Zhenfu
    Lu, Rongxing
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 467 - 477
  • [4] Implementation of Password-based Key Derivation Function for Authentication Scheme in Patrolling System
    Saputra, Laurentius Kuncoro Probo
    Raharjo, Willy Sudiarto
    [J]. PROCEEDINGS OF 2019 5TH INTERNATIONAL CONFERENCE ON NEW MEDIA STUDIES (CONMEDIA 2019), 2019, : 31 - 35
  • [5] A secure password-based authentication and key agreement scheme using smart cards
    Mishra, Dheerendra
    Das, Ashok Kumar
    Chaturvedi, Ankita
    Mukhopadhyay, Sourav
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 28 - 43
  • [6] A Password-based Key Establishment Protocol with Symmetric Key Cryptography
    Erguler, Imran
    Anarim, Emin
    [J]. 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 543 - 548
  • [7] Password-based independent authentication and key exchange protocol
    Jung, KS
    Kim, JY
    Chung, TC
    [J]. ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1908 - 1912
  • [8] A Password-based Key Establishment Protocol with Symmetric Key Cryptography
    Ergueler, Imran
    Anarim, Emin
    [J]. 2008 IEEE 16TH SIGNAL PROCESSING, COMMUNICATION AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2008, : 395 - 399
  • [9] Password-based key authentication model - A new approach
    Ibrahim, Yasir Khalil
    [J]. IMECS 2007: International Multiconference of Engineers and Computer Scientists, Vols I and II, 2007, : 2388 - 2390
  • [10] Security Analysis and Improvements of a Password-Based Mutual Authentication Scheme with Session Key Agreement
    An, Younghwa
    Joo, Youngdo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 85 - 94